VIII International scientific and practical conference �“Applied Information Systems and Technologies in the Digital Society” (AISTDS-2024)
1
Information Security Measures for a Procrastination-Combatting Digital Solution
Valentyna Pleskach, Irma Šileikienė, Romanas Tumasonis,
Yevhenii Topolskov
01.10.2024 Taras Shevchenko National University of Kyiv�
Aim of the Research
The Aim is to bridge the gap between application development and robust cybersecurity practices, ensuring that digital solutions are not only effective in addressing human behavioral issues like procrastination but are also secure against both current and potential future cyber threats.
2
Objectives of the Research
3
Information Security
The practice of protecting digital assets from unauthorized access
Data,
Networks,
Systems,
Devices
4
Security Threats and Vulnerabilities
5
Security Frameworks and Standards
6
Frameworks Comparison
7
Framework | Focus Area | Key Features | Applicability to Procrastination-Combatting Apps |
ISO/IEC 27001 | Comprehensive ISMS | Systematic approach, risk management, control implementation | High - versatile for all app types |
NIST Cybersecurity | Cybersecurity risk management | Core functions (Identify, Protect, Detect, Respond, Recover), tailored to organizational needs | Medium - ideal for critical infrastructure apps |
COBIT | IT governance and management | Aligns IT with business goals, ensures compliance, optimizes resources | Low - more suitable for enterprise IT management |
PCI DSS | Payment card data security | Secure data processing, strong access control, network infrastructure security | Medium - essential for apps handling payments |
GDPR | Data protection and privacy | Data subject rights, data protection principles, regulatory compliance | High - mandatory for apps used by EU residents |
Information and Functionality Architecture
8
Threat Analysis
9
Threat | Impact | Likelihood | Priority | Mitigation Strategy |
Spoofing Identity | High | Medium | High | Multi-factor authentication, security awareness training |
Tampering with Data | High | Low | Medium | Input validation and parameterized queries, least privilege access controls |
Repudiation | Medium | Medium | Medium | Content security policies, sanitize user input to prevent script injection |
Information Disclosure | Very High | High | Very High | Advanced encryption, enforce data access policies, conduct continuous monitoring |
Denial of Service | Medium | Medium | Medium | Anti-DDoS protections, ensure scalability and redundancy |
Elevation of Privilege | Very High | Low | High | Principle of least privilege, regular audits, anomaly detection systems |
User and System Interaction Analysis
10
Interaction Type | Description | Data Points | Security Concerns | Mitigation Strategies |
Account Creation and Management | Users create accounts and manage profiles | Email, username, password, personal details | Vulnerable to account takeover, and data breaches | Implement CAPTCHA, two-factor authentication (2FA), and rate limiting |
Task Management | Users input and manage tasks | Task descriptions, categories, deadlines | Unauthorized access, and data manipulation risks | Use data validation and user authentication to secure access |
Social Interaction | Users participate in groups, chat, and challenges | Messages, group memberships, interactions | Harassment, spreading of malware, privacy breaches | Content filtering, user reporting, and blocking mechanisms |
Reward System | Users earn and spend points on virtual goods | Points, item purchases, reward history | Exploitation of reward mechanisms, unfair manipulation | Monitor for unusual activity, and validate transactions server-side |
Implementing and Evaluating Security Measures for a Prototype
11
Conclusions
12
References
13
QUESTIONS ???
14